Breezy Blog - Mobile Printing Experts

Breezy is proud to be part of the Good Technology ISV partner pavilion (Booth #1B42) this week at the Mobile World Congress at the Fira Gran Via in Barcelona. Breezy will be demonstrating its secure mobile printing solution, which is fully integrated with Good Technology’s EMM products, throughout the show.

Breezy is a secure mobile printing system that lets users print from mobile devices. Every customer has different needs and requirements, so it’s vital that we understand each customer’s needs and criteria for judging a secure mobile printing solution before we begin an on-site evaluation.

When employees or groups of employees rely on unmanaged devices, source their own mobile apps and cloud services, and create their own technology workflows, it’s called shadow IT. And for most IT departments and CIOs, shadow IT is a major feature in nightmares and security worries.

A new report from TechNavio predicts that the worldwide market for secure mobile printing solutions will grow at a compound annual growth rate (CAGR) 32.5% over the five year period from 2014 to 2019. Increased implementation of the BYOD policy in offices is expected to propel the global mobile printing market during the forecast period.

According to a report this week from International Data Corporation (IDC), worldwide tablet shipments recorded a year-over-year decline for the first time since the market's inception in 2010. Overall shipments for tablets and 2-in-1 devices reached 76.1 million in the fourth quarter of 2014 (4Q14) for -3.2% growth, according to preliminary data from the IDC Worldwide Quarterly Tablet Tracker.

Although the fourth quarter witnessed a decline in the global market, IDC reported that tablet shipments for 2014 increased 4.4%, totaling 229.6 million units.

Each year, Gartner Research reviews the leading enterprise mobility management (EMM) suites, and ranks them based on performance, customer feedback, and product features as well as company stability. The 2014 Gartner Enterprise Mobility Management Magic Quadrant report lists five leaders in the category:

The Information Commissioner’s Office (ICO) for the United Kingdom recently issued its annual report on fines given to companies that failed to protect consumer data, and a surprising number of those fines were given out for data that involved data loss traced to multi-function devices (MFDs) such as copiers and scanners or multi-function printers (MFPs), including printed records and faxes.

As any IT professional can attest, the main challenge with BYOD can be summed up in a single sentence. “IT does not control the content and configuration of the device.”

Since the mobile devices belong to individual employees, IT policies calling for the company to view or wipe personal data are problematic. So most enterprise mobility management or mobile device management tools piggy-back on top of the user’s personal data, so that it can be removed when the device is no longer used for work.

Once upon a time, the goal of IT security professionals was to create an impenetrable security wall to protect company assets from outside thieves and hackers. IT World Canada says that’s an outdated idea, and CIOs in 2015 have given it up in favor of more achievable goals.

The article by Nestor Arellano says that mobile device headaches have changed cyber security forever, and that connected devices of all kinds have created a third platform that forces CIO’s to shift their focus towards risk assessment rather than the “outdated perception” of creating an impenetrable wall around the corporate network.

According to the Darkreading security blog, 2014 was a year when IT got BYOD wrong. In an article based on the results from a Bitdefender survey Darkreading said the numbers prove that we’re doing BYOD wrong.